Malicious communication behavior is the network communication behavior
g...
HTTP-based Trojan is extremely threatening, and it is difficult to be
ef...
Trojans are one of the most threatening network attacks currently. HTTP-...
Dynamic data flow analysis has been widely used to guide greybox fuzzing...
Cross-architecture binary similarity comparison is essential in many sec...
The big wave of Internet of Things (IoT) malware reflects the fragility ...
Binary authorship analysis is a significant problem in many software
eng...